Whitelist Digest

Many security technologies rely on blacklisting malicious or suspi- cious files or applications in order to prevent users from running them. But that approach can have its limitations, and theidea of whitelisting applications and safe files has taken hold recently.
→

Like many other security technologies, there a number of approaches for implementing applicaiton whitelisting. Each offers its own unique benefits, but they're not all equally effective. Few of the current technologies have undergone any independent testing and there isn't much objective information available of their effectiveness. In this video, Vladimir Zapolyansky discusses the need for independent testing and what makes Kasperksy Lab's offering different.
→